• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Computer Forensics

Results for "computer+forensics"


  • Status: Free Trial
    Free Trial
    M

    Macquarie University

    Cyber Security: Mobile Security

    Skills you'll gain: Mobile Security, Investigation, Mobile Development, Apple iOS, Criminal Investigation and Forensics, Android (Operating System), Application Security, Legal Proceedings, Cybersecurity, File Systems, Malware Protection, Computer Security, Secure Coding, Computer Security Incident Management, Cloud Security, Security Strategy, Analysis, Encryption, Debugging, Disaster Recovery

    4.5
    Rating, 4.5 out of 5 stars
    ·
    11 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    Universidad de los Andes

    Seguridad en la red

    Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Digital Forensics, Information Systems Security, Cybersecurity, Cloud Security, Security Controls, Cloud Computing

    4.9
    Rating, 4.9 out of 5 stars
    ·
    130 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California, Irvine

    Data, Security, and Privacy

    Skills you'll gain: digital literacy, Systems Development, Data Security, System Design and Implementation, Data Ethics, Cybersecurity, Safety and Security, Information Technology, Information Privacy, Computer Literacy, Software Development Tools, Technology Strategies

    4.5
    Rating, 4.5 out of 5 stars
    ·
    50 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Technical Deep Dive with Incident Response Tools

    Skills you'll gain: Incident Response, Computer Security Incident Management, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Digital Forensics, Data Security, Network Analysis, Exploit development, Malware Protection, Vulnerability Assessments

    4.8
    Rating, 4.8 out of 5 stars
    ·
    91 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    J

    Johns Hopkins University

    Computing for Cancer Informatics

    Skills you'll gain: Computer Systems, Informatics, Data Processing, Data Sharing, Computing Platforms, Bioinformatics, Data Storage, Computer Literacy, Computer Hardware, Big Data, Capacity Management, Data Centers, Computer Security Awareness Training, Cloud Computing, Oncology

    4.6
    Rating, 4.6 out of 5 stars
    ·
    15 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    G

    Google

    Network Traffic and Logs Using IDS and SIEM Tools

    Skills you'll gain: System Monitoring, Computer Security Incident Management, Network Analysis, Data Integrity

    4.7
    Rating, 4.7 out of 5 stars
    ·
    10 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking Unix and Windows

    Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Cyber Security Assessment, Application Security, Unix, Vulnerability Assessments, Unix Shell, Computer Architecture, Unix Commands, Linux Commands, Scripting, Linux, Debugging, Authentications, File Management

    Build toward a degree

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Detecting and Mitigating Cyber Threats and Attacks

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Incident Response, Computer Security Incident Management, Cybersecurity, Threat Management, Data Security, Cyber Attacks, Endpoint Security, Network Security, Cyber Security Assessment, Firewall

    4.7
    Rating, 4.7 out of 5 stars
    ·
    458 reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Preview
    Preview
    S

    Starweaver

    Legal and Ethical Cyber Investigations

    Skills you'll gain: Digital Forensics, Electronic Discovery, Investigation, Criminal Investigation and Forensics, Incident Response, Cyber Threat Intelligence, Technical Communication, Computer Security Incident Management, Report Writing, Cybersecurity, Cyber Security Policies, Fraud detection, Legal Proceedings, Law, Regulation, and Compliance, Ethical Standards And Conduct, Business Ethics, Compliance Reporting, Data Collection, Analysis, Management Reporting

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Cyber Incident Response

    Skills you'll gain: Incident Response, Computer Security Incident Management, Cybersecurity, Cyber Threat Hunting, Cyber Attacks, Threat Detection, Security Management, Digital Forensics, Disaster Recovery, Malware Protection, Vulnerability Assessments, Network Analysis, Technical Communication

    4.7
    Rating, 4.7 out of 5 stars
    ·
    178 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Introduction to Cybersecurity for Business

    Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Risk Management, Enterprise Security, Cyber Security Assessment, Vulnerability Assessments, Encryption, Data Security, Information Assurance, Authentications, Network Protocols

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    1.1K reviews

    Beginner · Course · 1 - 3 Months

  • Status: Preview
    Preview
    U

    Universidades Anáhuac

    Digital Shield: Cybersecurity for Data and System Protection

    Skills you'll gain: Cybersecurity, Cyber Attacks, Information Systems Security, Data Security, Malware Protection, Computer Security Awareness Training, Security Controls, Intrusion Detection and Prevention, Vulnerability Assessments, Threat Detection, Network Security, Security Awareness, Security Strategy, Encryption

    Intermediate · Course · 1 - 3 Months

1…567…9

In summary, here are 10 of our most popular computer+forensics courses

  • Cyber Security: Mobile Security: Macquarie University
  • Seguridad en la red: Universidad de los Andes
  • Data, Security, and Privacy: University of California, Irvine
  • Technical Deep Dive with Incident Response Tools: Infosec
  • Computing for Cancer Informatics: Johns Hopkins University
  • Network Traffic and Logs Using IDS and SIEM Tools: Google
  • Security & Ethical Hacking: Attacking Unix and Windows : University of Colorado Boulder
  • Detecting and Mitigating Cyber Threats and Attacks: University of Colorado System
  • Legal and Ethical Cyber Investigations : Starweaver
  • Cyber Incident Response: Infosec

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok